On Sun, Dec 11, 2011 at 01:54, Brian Quick <brian.e.quick1 (at) gmail (dot) com [email concealed]> wrote:
> Here is a great checklist to begin with a general list.
> http://mdsec.net/wahh/tasks.html
>
> BEQ
>
> On Mon, Dec 5, 2011 at 3:21 AM, cribbar <crib.bar (at) hotmail.co (dot) uk [email concealed]> wrote:
>>
>> Hey all,
>>
>> Has anyone ever audited a proxy during a pen test/IT audit or as an audit on
>> itself? If so do you have a scope of what kind of checks you reviewed, or a
>> checklist? The proxy software in question is web sense which addresses both
>> email filtering and web filtering. Or any tools that can automate the
>> process most welcome. Look forward to your responses ? I couldn?t find to
>> many resources on proxy auditing.
>>
>> Kind Regards
>> Cb
>> --
>> View this message in context: http://old.nabble.com/auditing-web-mail-proxies-tp32916010p32916010.html

>> This list is sponsored by: Information Assurance Certification Review Board
>>
>> Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
>>
>> http://www.iacertification.org
>> ------------------------------------------------------------------------

> This list is sponsored by: Information Assurance Certification Review Board
>
> Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
>
> http://www.iacertification.org
> ------------------------------------------------------------------------